6.033 | Spring 2018 | Undergraduate

Computer System Engineering

Week 14: Security Part IV

Lecture 25: Tor

Lecture 25 Outline

  1. Introduction
  2. Cryptography Review
  3. Tor
  4. Attacks on Tor
  5. Performance
  6. Summary

Lecture Slides


  • [No readings]

Recitation 25: Meltdown

Lecture 26: Policy vs. Mechanism

Lecture Slides


Recitation 26: Trusting Trust


Quiz 2

Quiz 2 will last two hours. The quiz will cover all the material starting from Lecture 14 up to and including Recitation 25 (Meltdown). We will not explicitly test you on any material from the last lecture and recitation (L26, R26). Note, though, that much of the content during those sessions will tie together concepts from the rest of the class, which will be useful on Quiz 2.

The quiz will be “open book.” That means you can bring along any printed or written materials that you think might be useful. Calculators are allowed, though typically not necessary. You may also bring a laptop to view, e.g., PDF versions of papers and notes, but you may not connect to any network; make sure you download the papers to your laptop before the quiz. Charge your laptops before you come; we cannot guarantee outlet availability.

Course Info

As Taught In
Spring 2018
Learning Resource Types
Lecture Notes
Written Assignments
Projects with Examples
Instructor Insights